Sciweavers

79 search results - page 9 / 16
» A Biometric Identity Based Signature Scheme
Sort
View
CVPR
2010
IEEE
14 years 6 months ago
Scalable Face Image Retrieval with Identity-Based Quantization and Multi-Reference Re-ranking
State-of-the-art image retrieval systems achieve scalability by using bag-of-words representation and textual retrieval methods, but their performance degrades quickly in the face...
Zhong Wu, Qifa Ke, Jian Sun, Heung-Yeung Shum
EUROCRYPT
2003
Springer
14 years 4 months ago
Extracting Group Signatures from Traitor Tracing Schemes
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-He...
Aggelos Kiayias, Moti Yung
SSWMC
2004
14 years 8 days ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
IEEEARES
2009
IEEE
14 years 5 months ago
Identity-Based Hybrid Signcryption
—Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than th...
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
12 years 1 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry